[OpenID] Fwd: XRDS multi-OP listing?

Brandon Ramirez brandon.s.ramirez at gmail.com
Sat Jun 7 17:33:35 UTC 2008


Gmail says that the message failed to send, but it was in my sent items
attached to this thread, so I have no idea if it went through or not.  I
think the S/MIME plug-in messed it up.  Re-sending...

- Brandon

---------- Forwarded message ----------
From: Brandon Ramirez <brandon.s.ramirez at gmail.com>
Date: Sat, Jun 7, 2008 at 1:28 PM
Subject: Re: [OpenID] XRDS multi-OP listing?
To: Martin Atkins <mart at degeneration.co.uk>
Cc: general at openid.net


I see two problems with this approach.


   1. From an RP perspective, when their login routine discovers an XRDS
   document, they assume (based on the design of OpenID) that the end user is
   fine with any of the OpenID providers listed as representing the user.  In
   essence, neither one "identifies" the user better than the other.  Any of
   them should be satisfactory.  That is the reason why access to the XRDS
   document should be very well protected.  If someone logs into my web site
   via FTP and edits my OpenID XRDS file, they can insert an OpenID provider
   under their control there.  The trust is in that file truly representing the
   human being's wishes.  Since the RP's don't record users based on their
   chosen provider, but by their OpenID URL, they are unaware of the
   authentication being used.  If they all represent the same person and return
   the same information (identity attributes), then what does any of it
   matter?  The only advantage I could see to this option is to have certain
   web sites always use a particular OP, for example, I might want my bank to
   only authenticate against the OP that uses PKI or Info Card authentication,
   while allowing password-based login to my Blogger account.  This could be
   akin to a club verifying my age by my driver's license, then the next day
   seeing my student ID card and saying "oh, it's the same person, so this must
   be okay".  The trust in each provider is different, and this option assumes
   that they are the same (although I guess that is a problem with allowing a
   one-to-many relationship between OpenID URL's and OP's anyway).  Bottom
   line: This option does not model identity very well because it provides
   inconsistent security to the RP.  Of course, there is little trust anyway
   since OpenID does not have an active trust framework.  So I'm sort of on the
   fence here.
   2. There is little to no ROI from an RP perspective.  If anything, I want
   to go the other way and only allow certain trusted OP's, not open the door
   for the user to not only use multiple OP's, but pick a different one at
   random each time.  The risk is slighlty higher.  The work to implement this,
   though not large, is there and not necessary.  Where is the incentive?

Just my 2 cents...

- Brandon


On Fri, Jun 6, 2008 at 3:07 AM, Martin Atkins <mart at degeneration.co.uk>
wrote:

> SitG Admin wrote:
> >
> >> You got me thinking though about a way for the user (or someone on his
> >> behalf) host the selector himself.
> >
> > I found this idea to be very exciting at first, because it would allow
> > users without dynamic coding ability *or* hosts that support server-side
> > scripting to outsource the job to sites that *do*. And at first I was
> > thinking that the privacy-enhancing effect from decentralization would
> > be even more available, since the ID selector would be very simple
> > compared to implementing an OpenID server or similar, enabling just
> > about *anyone* to run a selector - but then I realized that it'd *also*
> > be introducing yet another point of *failure*. You're essentially doing
> > the equivalent of giving some third party root access to your OpenID
> > headers, without exposing the rest of your site to their access or
> > control, but that third party can be hostile or become compromised. Is
> > the security at this third party equal to or superior to what you use to
> > protect your site?
>
> The provider selector doesn't actually have any ability to make
> assertions on behalf of the providers. Only providers listed via the
> normal delegation mechanism in the XRDS document would actually be able
> to make assertions. Maybe an example would help to illustrate this:
>
> <xrds:XRDS xmlns:xrds="xri://$xrds" xmlns="xri://$xrd*($v*2.0)"><XRD>
>     <Service priority="40">
>         <Type>http://openid.net/signon/1.0</Type>
>         <URI>http://www.livejournal.com/openid/server.bml</URI>
>         <LocalID>http://exampleusername.livejournal.com/</LocalID>
>     </Service>
>     <Service>
>         <Type>http://openid.net/signon/1.0</Type>
>         <URI>http://example.com/openidserver</URI>
>         <LocalID>http://blah.example.com/</LocalID>
>     </Service>
>     <Service>
>         <Type>http://example.net/openid-provider-selector</Type>
>         <URI>http://www.example.org/opselector</URI>
>     </Service>
> </XRD></xrds:XRDS>
>
> Note that the OP selector is not itself a provider, so it has no ability
> to make assertions about this identifier itself. Only LiveJournal and
> example.com can actually make assertions, or else the verification step
> will fail.
>
> Of course, if a third-party is hosting your XRDS document then they
> could change it to say whatever they like. I would guess that in
> practice almost everyone using delegation has a third-party hosting
> their XRDS document, whether it be on a basic web hosting account or on
> a rented server.
>
> I see your concern about it being another thing that might fail.
>
> > The person hosting your OP selector can keep records for the user of
> > what OP's have been designated in the past, but that same person could
> > omit from their records any sign that they were having their selector
> > redirect requests from certain RP's to an OP they controlled, so it's a
> > bit more serious than just a compromised OP; how do you know whether
> > your OP was used or the person hosting your selector authenticated as
> > you using another OP or the RP for some reason logged you in without
> > properly verifying your identity?
>
> Are you describing a variant on the OP-spoofing phishing attack here?
>
> I suppose that's possible. However, since the OP selector is a service
> that was chosen by the user rather than an arbitrary site as in the RP
> phishing case I would consider this less of a problem here.
>
>
> _______________________________________________
> general mailing list
> general at openid.net
> http://openid.net/mailman/listinfo/general
>
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.openid.net/pipermail/openid-general/attachments/20080607/acae5ced/attachment-0002.htm>


More information about the general mailing list